Sarah Jamie Lewis is an anonymity and privacy researcher with a special interest in the privacy protocols (or lack thereof) of
sex toy
A sex toy is an object or device that is primarily used to facilitate human sexual pleasure, such as a dildo, artificial vagina or vibrator. Many popular sex toys are designed to resemble human genitals, and may be vibrating or non-vibrati ...
s.
She has been cited in academic research regarding the security
and
ethics
Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of right and wrong behavior".''Internet Encyclopedia of Philosophy'' The field of ethics, along with aesthetics, concerns ...
considerations associated with this technology.
Lewis has shared concerns about the lack of legal framework related to the field of
onion
An onion (''Allium cepa'' L., from Latin ''cepa'' meaning "onion"), also known as the bulb onion or common onion, is a vegetable that is the most widely cultivated species of the genus ''Allium''. The shallot is a botanical variety of the oni ...
dildonics, stating that "We are currently sprinting into this world of connected sex toys and connected sex tech without regards to what consent, privacy, or security means in that context..." and recommending "100% encrypted
peer-to-peer
Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. Peers are equally privileged, equipotent participants in the network. They are said to form a peer-to-peer ...
cyber sex over
tor hidden services."
More generally, due to the litigious environment in which computer security researchers operate, she has opted to build bespoke secure systems rather than fix broken systems.
See also
*
Crypto-anarchism
Crypto-anarchism or cyberanarchism is a political ideology focusing on protection of privacy, political freedom, and economic freedom, the adherents of which use cryptographic software for confidentiality and security while sending and receiving ...
*
Tor (anonymity network)
Tor, short for The Onion Router, is free and open-source software for enabling anonymous communication. It directs Internet traffic through a free, worldwide, volunteer overlay network, consisting of more than seven thousand relays, to co ...
*
Dark web
The dark web is the World Wide Web content that exists on '' darknets'': overlay networks that use the Internet but require specific software, configurations, or authorization to access. Through the dark web, private computer networks can commu ...
*
Ricochet (software)
Ricochet or Ricochet IM is a free software, multi-platform, instant messaging software project originally developed by John Brooks and later adopted as the official instant messaging client project of the Invisible.im group. A goal of the Invisibl ...
References
External links
*https://sarahjamielewis.com Professional website
*https://twitter.com/SarahJamieLewis Twitter account
*https://www.youtube.com/watch?v=C54zs_-Scg8 Queer Privacy & Building Consensual Systems at Hack.Lu
*https://www.youtube.com/watch?v=ShrZ4B9R3NQ Excuse Me, I Think Your Darkweb is Leaking!
*https://www.youtube.com/watch?v=3cpx7q7SYm8 Darknet Cartography: Mapping the Evolution & Future of Anonymity
*https://soundcloud.com/thingsintersect/episode-6-sex
IoT,
SESTA, and
Deepfake
Deepfakes (a portmanteau of " deep learning" and "fake") are synthetic media in which a person in an existing image or video is replaced with someone else's likeness. While the act of creating fake content is not new, deepfakes leverage powerf ...
*https://www.engadget.com/2017/05/24/sextech-hacking-laws/ The law isn’t ready for the internet of sexual assault: What happens when our most intimate devices get hacked?
*https://www.theguardian.com/technology/2017/dec/10/better-loving-through-technology-sex-toy-hackathon Tricky tech questions: Is hacking a sex toy sexual assault?
{{DEFAULTSORT:Lewis, Sarah Jamie
Year of birth missing (living people)
Living people
Privacy activists
People associated with computer security
Computer security specialists
People in information technology
InfoSec Twitter